Appearance
Why It Matters
Shared MCP configs should not launch commands that read host authentication or privilege files. Doing so can leak credential material or privilege policy to tools controlled through the repository.
What Triggers
SEC638 matches MCP command definitions that directly reference /etc/shadow, /etc/passwd, /etc/sudoers, /etc/gshadow, or /etc/master.passwd in command strings or arguments.
False Positives
System-audit tooling may intentionally inspect these files, but embedding that access in shared MCP launch config is still high-risk and generally merits review.
Remediation
Remove sensitive password-file access from the MCP definition. If host auditing is required, isolate it into a separately reviewed administrative workflow.